Comparing the Use and Usefulness of Four IoT Security Labels.
Peter J. CavenZitao ZhangJacob AbbottXinyao MaL. Jean CampPublished in: CHI (2024)
Keyphrases
- security problems
- key management
- security requirements
- access control
- security issues
- security policies
- information assurance
- intrusion detection
- information security
- statistical databases
- security threats
- security protocols
- pairwise
- training data
- functional requirements
- security mechanisms
- management system
- security systems
- security level
- security management
- network security
- information systems
- big data
- context aware
- markov random field
- active learning
- security measures